Analysis
-
max time kernel
149s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 23:16
Static task
static1
Behavioral task
behavioral1
Sample
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
Resource
win10v2004-20240508-en
General
-
Target
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe
-
Size
4.1MB
-
MD5
cc8735f627d445498e226718a9f8c452
-
SHA1
1989922ad03ce41fd620ca8037a8ed4c288d31b3
-
SHA256
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da
-
SHA512
74891582f528113479e5903c1b174ca62919454df0799f039bfd334cdf799a3732263f9d85cfc8c5616f836d2fc9303a77891f413c64876d1efbdbf10bfc7748
-
SSDEEP
98304:+R0pI/IQlUoMPdmpSpC4ADtnkgvNWlw6aTfN41v:+R0pIAQhMPdmF5n9klRKN41v
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
devdobsys.exepid process 4640 devdobsys.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\Parametr = "C:\\KaVB88\\dobaloc.exe" 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe Set value (str) \REGISTRY\USER\S-1-5-21-2539840389-1261165778-1087677076-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Parametr = "C:\\Adobe8O\\devdobsys.exe" 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exedevdobsys.exepid process 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 4640 devdobsys.exe 4640 devdobsys.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exedescription pid process target process PID 2392 wrote to memory of 4640 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe devdobsys.exe PID 2392 wrote to memory of 4640 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe devdobsys.exe PID 2392 wrote to memory of 4640 2392 762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe devdobsys.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe"C:\Users\Admin\AppData\Local\Temp\762d226a66cd228ba3c7991c20dc604face60fe41d776da8fc39a964417874da.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Adobe8O\devdobsys.exeC:\Adobe8O\devdobsys.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Adobe8O\devdobsys.exeFilesize
4.1MB
MD58b82cd9a6be8d1ac9c7c59071304d46c
SHA1cfcce75ea88badeb304a568541347880089ee23f
SHA25651b834b2505b379fb57b7bf5a33d465d4aa9d571d6b37fa1597256e5421e6bb1
SHA51283cfafe03acb8e3da4b8d1f3c9e281a8019f536ae5ea56846b9372ba0c0a07b39c26c69393feb9d8177eac439024172af87bb807a74a0c0b0c33ef05b35614dc
-
C:\KaVB88\dobaloc.exeFilesize
2.3MB
MD563e0a0d0317c8d0596b4c4ed6bfcb667
SHA1585f0b038bc704a3ece3a7e6efe980dedb3c21e9
SHA256a6ef5e25b420deb276432d8ad0c9dced2057e427678719bd9b5f44efea3dc501
SHA5126e6e7eec18b7bbea45eb84f290aa5493b40fe3d37ed3ad71a980ccb0071a85973a5bc8d273e9bb847aa3512ed11be78bd816662a2f0ccc0755b01e68c0046d82
-
C:\KaVB88\dobaloc.exeFilesize
4.1MB
MD59ff8dee5428c563f07e3ba95ec45c0f0
SHA1b94963818ebf299c23cc7e5604b9e55ec3cf7efa
SHA256092780bbbf1989c25f90126f31f2b7080f9a4250b6fe022b739f0d5b1e8495eb
SHA51271a557052996a3b0c20ce25c488cb7aa617ee7c76f40f1993c462d966ade835c83d861629e9a895a28ab9c507a5c326305f705b55a562d65c7ef4f4d3fa2414a
-
C:\Users\Admin\253086396416_10.0_Admin.iniFilesize
204B
MD5aa8feed7b2ded28f04933c49ea2f5559
SHA14b5fac8b1ba55a10fe088ced7a0840aef914fb8a
SHA25650899a1e6f7fe7b5699c0d70a5bd5762e2fd4aaacd5ce72bce91b8d82b332cea
SHA51298f2201883e985e7b71df546bbaf6befcfd06f690750e3db0be995b9a1f036795ebbbb4fc967b4099fc21d7b04f4441c3d0ce65568d9f86180ee1595eca2d8b2